TY - GEN
T1 - Blue team red team approach to hardware trust assessment
AU - Rajendran, Jeyavijayan
AU - Jyothi, Vinayaka
AU - Karri, Ramesh
PY - 2011
Y1 - 2011
N2 - Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.
AB - Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.
UR - http://www.scopus.com/inward/record.url?scp=83455196098&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=83455196098&partnerID=8YFLogxK
U2 - 10.1109/ICCD.2011.6081410
DO - 10.1109/ICCD.2011.6081410
M3 - Conference contribution
AN - SCOPUS:83455196098
SN - 9781457719523
T3 - Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors
SP - 285
EP - 288
BT - 2011 IEEE 29th International Conference on Computer Design, ICCD 2011
T2 - 29th IEEE International Conference on Computer Design 2011, ICCD 2011
Y2 - 9 November 2011 through 12 November 2011
ER -